메뉴 건너뛰기




Volumn , Issue , 2013, Pages 813-825

PICCO: A general-purpose compiler for private distributed computation

Author keywords

compiler; general purpose computation; linear secret sharing; parallel execution; secure computation outsourcing; secure multi party computation; source to source translator

Indexed keywords

COMPILER; GENERAL-PURPOSE COMPUTATIONS; PARALLEL EXECUTIONS; SECRET SHARING; SECURE COMPUTATION; SECURE MULTI-PARTY COMPUTATION; SOURCE-TO-SOURCE TRANSLATORS;

EID: 84889039708     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516752     Document Type: Conference Paper
Times cited : (90)

References (38)
  • 8
    • 70349266254 scopus 로고    scopus 로고
    • FairplayMP: A system for secure multi-party computation
    • A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP: A system for secure multi-party computation. In CCS, 2008.
    • CCS, 2008
    • Ben-David, A.1    Nisan, N.2    Pinkas, B.3
  • 10
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacy-preserving computations
    • D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In ESORICS, pages 192-206, 2008.
    • (2008) ESORICS , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 11
    • 84867711104 scopus 로고    scopus 로고
    • High-performance secure multi-party computation for data mining applications
    • D. Bogdanov, M. Niitsoo, T. Toft, and J. Willemson. High-performance secure multi-party computation for data mining applications. IJIS, 11(6):403-418, 2012.
    • (2012) IJIS , vol.11 , Issue.6 , pp. 403-418
    • Bogdanov, D.1    Niitsoo, M.2    Toft, T.3    Willemson, J.4
  • 14
    • 84863447066 scopus 로고    scopus 로고
    • SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
    • M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In USENIX Security Symposium, pages 223-240, 2010.
    • (2010) USENIX Security Symposium , pp. 223-240
    • Burkhart, M.1    Strasser, M.2    Many, D.3    Dimitropoulos, X.4
  • 15
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 17
    • 77955328311 scopus 로고    scopus 로고
    • Secure computation with fixed-point numbers
    • O. Catrina and A. Saxena. Secure computation with fixed-point numbers. In FC, pages 35-50, 2010.
    • (2010) FC , pp. 35-50
    • Catrina, O.1    Saxena, A.2
  • 18
    • 21144458613 scopus 로고    scopus 로고
    • Share conversion, pseudorandom secret-sharing and applications to secure computation
    • R. Cramer, I. Damgård, and Y. Ishai. Share conversion, pseudorandom secret-sharing and applications to secure computation. In TCC, pages 342-362, 2005.
    • (2005) TCC , pp. 342-362
    • Cramer, R.1    Damgård, I.2    Ishai, Y.3
  • 19
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous multiparty computation: Theory and implementation
    • I. Damgård, M. Geisler, and M. Krøigård. Asynchronous multiparty computation: Theory and implementation. In PKC, pages 160-179, 2009.
    • (2009) PKC , pp. 160-179
    • Damgård, I.1    Geisler, M.2    Krøigård, M.3
  • 20
    • 77955317678 scopus 로고    scopus 로고
    • Secure multiparty AES
    • I. Damgård and M. Keller. Secure multiparty AES. In FC, pages 367-374, 2010.
    • (2010) FC , pp. 367-374
    • Damgård, I.1    Keller, M.2
  • 22
    • 85056898575 scopus 로고    scopus 로고
    • Scalable and unconditionally secure multiparty computation
    • I. Damgård and J. Nielsen. Scalable and unconditionally secure multiparty computation. In CRYPTO, 2007.
    • CRYPTO, 2007
    • Damgård, I.1    Nielsen, J.2
  • 24
    • 0347507496 scopus 로고    scopus 로고
    • The implementation of the Cilk-5 multithreaded language
    • M. Frigo, C. Leiserson, and K. Randall. The implementation of the Cilk-5 multithreaded language. In PLDI, pages 212-223, 1998.
    • (1998) PLDI , pp. 212-223
    • Frigo, M.1    Leiserson, C.2    Randall, K.3
  • 26
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
    • R. Gennaro, M. Rabin, and T. Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In PODC, pages 101-111, 1998.
    • (1998) PODC , pp. 101-111
    • Gennaro, R.1    Rabin, M.2    Rabin, T.3
  • 27
    • 0023547498 scopus 로고    scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
    • STOC, 1987
    • Goldreich, O.1
  • 28
  • 32
    • 80755169442 scopus 로고    scopus 로고
    • Automatically optimizing secure computation
    • F. Kerschbaum. Automatically optimizing secure computation. In CCS, pages 703-714, 2011.
    • (2011) CCS , pp. 703-714
    • Kerschbaum, F.1
  • 33
    • 84870474934 scopus 로고    scopus 로고
    • Efficient lookup-table protocol in secure multiparty computation
    • J. Launchbury, I. Diatchki, T. DuBuisson, and A. Adams-Moran. Efficient lookup-table protocol in secure multiparty computation. In ICFP, pages 189-200, 2012.
    • (2012) ICFP , pp. 189-200
    • Launchbury, J.1    Diatchki, I.2    DuBuisson, T.3    Adams-Moran, A.4
  • 34
    • 84879868386 scopus 로고    scopus 로고
    • From oblivious AES to efficient and secure database join in the multiparty setting
    • S. Laur, R. Talviste, and J. Willemson. From oblivious AES to efficient and secure database join in the multiparty setting. In ACNS, pages 84-101, 2013.
    • (2013) ACNS , pp. 84-101
    • Laur, S.1    Talviste, R.2    Willemson, J.3
  • 37
    • 80054976361 scopus 로고    scopus 로고
    • L1 - An intermediate language for mixed-protocol secure computation
    • A. Schroepfer, F. Kerschbaum, and G. Mueller. L1 - An intermediate language for mixed-protocol secure computation. In COMPSAC, pages 298-307, 2011.
    • (2011) COMPSAC , pp. 298-307
    • Schroepfer, A.1    Kerschbaum, F.2    Mueller, G.3
  • 38
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.